Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 08:13
Behavioral task
behavioral1
Sample
a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe
Resource
win10v2004-20241007-en
General
-
Target
a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe
-
Size
2.9MB
-
MD5
5193bf988a037c1ef8579bc604f62df0
-
SHA1
7b9f22779382c7edbe6f916808ce41d2c5f22aec
-
SHA256
a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8
-
SHA512
4e6ec90842014a6c2aa9b1d213630f4789ded034e3213f9faf5ab5fb30915317fece5bae9f37e572700faa4ac4599f0c2702055b93709e3aadbf6d9d5659acb0
-
SSDEEP
24576:ATU7AfmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHs:ATU7Afmw4gxeOw46fUbNecCCFbNecn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023cb7-36.dat warzonerat behavioral2/files/0x0008000000023cb5-62.dat warzonerat behavioral2/files/0x0004000000000713-78.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 19 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 36 IoCs
pid Process 4680 explorer.exe 4636 explorer.exe 3224 explorer.exe 1596 spoolsv.exe 4064 spoolsv.exe 2940 spoolsv.exe 2628 spoolsv.exe 1084 spoolsv.exe 3608 spoolsv.exe 1288 spoolsv.exe 912 spoolsv.exe 976 spoolsv.exe 3400 spoolsv.exe 5028 spoolsv.exe 332 spoolsv.exe 2288 spoolsv.exe 2908 spoolsv.exe 1980 spoolsv.exe 1168 spoolsv.exe 2920 spoolsv.exe 4160 spoolsv.exe 2788 spoolsv.exe 1476 spoolsv.exe 3424 spoolsv.exe 4484 spoolsv.exe 4472 spoolsv.exe 3876 spoolsv.exe 2372 spoolsv.exe 3444 spoolsv.exe 2044 spoolsv.exe 1456 spoolsv.exe 2940 spoolsv.exe 432 spoolsv.exe 1864 spoolsv.exe 412 spoolsv.exe 3096 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 4064 set thread context of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 3512 set thread context of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 set thread context of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 4680 set thread context of 4636 4680 explorer.exe 107 PID 4636 set thread context of 3224 4636 explorer.exe 109 PID 4636 set thread context of 4284 4636 explorer.exe 110 PID 1596 set thread context of 4064 1596 spoolsv.exe 114 PID 2940 set thread context of 2628 2940 spoolsv.exe 118 PID 1084 set thread context of 3608 1084 spoolsv.exe 122 PID 1288 set thread context of 912 1288 spoolsv.exe 126 PID 976 set thread context of 3400 976 spoolsv.exe 130 PID 5028 set thread context of 332 5028 spoolsv.exe 134 PID 2288 set thread context of 2908 2288 spoolsv.exe 138 PID 1980 set thread context of 1168 1980 spoolsv.exe 142 PID 2920 set thread context of 4160 2920 spoolsv.exe 146 PID 2788 set thread context of 1476 2788 spoolsv.exe 150 PID 3424 set thread context of 4484 3424 spoolsv.exe 154 PID 4472 set thread context of 3876 4472 spoolsv.exe 158 PID 2372 set thread context of 3444 2372 spoolsv.exe 162 PID 2044 set thread context of 1456 2044 spoolsv.exe 166 PID 2940 set thread context of 432 2940 spoolsv.exe 170 PID 1864 set thread context of 412 1864 spoolsv.exe 174 -
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4064-11-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x0009000000023cb7-36.dat upx behavioral2/memory/4680-51-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x0008000000023cb5-62.dat upx behavioral2/files/0x0004000000000713-78.dat upx behavioral2/memory/1596-93-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2940-95-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1084-119-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1288-132-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/976-147-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/5028-160-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2288-174-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1980-186-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2920-199-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2788-202-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3424-216-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3424-228-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4472-242-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2372-245-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2044-259-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2940-274-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1864-300-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4680 explorer.exe 4680 explorer.exe 1596 spoolsv.exe 1596 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 3224 explorer.exe 3224 explorer.exe 2940 spoolsv.exe 2940 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 1084 spoolsv.exe 1084 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 1288 spoolsv.exe 1288 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 976 spoolsv.exe 976 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 5028 spoolsv.exe 5028 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2288 spoolsv.exe 2288 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 1980 spoolsv.exe 1980 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2920 spoolsv.exe 2920 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2788 spoolsv.exe 2788 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 3424 spoolsv.exe 3424 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 4472 spoolsv.exe 4472 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2372 spoolsv.exe 2372 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2044 spoolsv.exe 2044 spoolsv.exe 3224 explorer.exe 3224 explorer.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 4680 explorer.exe 4680 explorer.exe 3224 explorer.exe 3224 explorer.exe 1596 spoolsv.exe 1596 spoolsv.exe 3224 explorer.exe 3224 explorer.exe 2940 spoolsv.exe 2940 spoolsv.exe 1084 spoolsv.exe 1084 spoolsv.exe 1288 spoolsv.exe 1288 spoolsv.exe 976 spoolsv.exe 976 spoolsv.exe 5028 spoolsv.exe 5028 spoolsv.exe 2288 spoolsv.exe 2288 spoolsv.exe 1980 spoolsv.exe 1980 spoolsv.exe 2920 spoolsv.exe 2920 spoolsv.exe 2788 spoolsv.exe 2788 spoolsv.exe 3424 spoolsv.exe 3424 spoolsv.exe 4472 spoolsv.exe 4472 spoolsv.exe 2372 spoolsv.exe 2372 spoolsv.exe 2044 spoolsv.exe 2044 spoolsv.exe 2940 spoolsv.exe 2940 spoolsv.exe 1864 spoolsv.exe 1864 spoolsv.exe 3096 spoolsv.exe 3096 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 436 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 83 PID 4064 wrote to memory of 436 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 83 PID 4064 wrote to memory of 436 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 83 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 4064 wrote to memory of 3512 4064 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 85 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 4356 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 102 PID 3512 wrote to memory of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 3512 wrote to memory of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 3512 wrote to memory of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 3512 wrote to memory of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 3512 wrote to memory of 868 3512 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 103 PID 4356 wrote to memory of 4680 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 104 PID 4356 wrote to memory of 4680 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 104 PID 4356 wrote to memory of 4680 4356 a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe 104 PID 4680 wrote to memory of 1004 4680 explorer.exe 105 PID 4680 wrote to memory of 1004 4680 explorer.exe 105 PID 4680 wrote to memory of 1004 4680 explorer.exe 105 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107 PID 4680 wrote to memory of 4636 4680 explorer.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe"C:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exeC:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exeC:\Users\Admin\AppData\Local\Temp\a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8N.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1004
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4636 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3224 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1456
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2172
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4680
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2204
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3632
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2388
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1260
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3700
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:432
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1084
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3836
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:4284
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD55193bf988a037c1ef8579bc604f62df0
SHA17b9f22779382c7edbe6f916808ce41d2c5f22aec
SHA256a29ba5ad073fc99d7326e9e317d04f52b3e247ff2cbf085b9fb8c577d5c299e8
SHA5124e6ec90842014a6c2aa9b1d213630f4789ded034e3213f9faf5ab5fb30915317fece5bae9f37e572700faa4ac4599f0c2702055b93709e3aadbf6d9d5659acb0
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD51d4bcb36d99c9bf013f2b32ad3702770
SHA1fc233c3a9682a993f593088fcb0babb0e3b10402
SHA2560c66297a0edf630a24775f7ac6a6d21c03c74a6fe75670ed77f3075353d5437b
SHA5127e4d759dd2128c75cf2f6c5228a4a297bab8a4b68e2bdeba5ca61f8dd68fcd516aec46f5e00f0ea78ffa91fd267611fed89de89d0c2afa27cdc206ff589afcc0
-
Filesize
2.9MB
MD5aef0b8a6393165324a9bf19958dbbb38
SHA14dc5e6374b02c816594d69b16072431991a3d7e8
SHA256d5dbc8e0f4c6af286b3e4014fea3000d68e952867434695e1b04e75013b44e1b
SHA512f2665d46498db11f51ab0eb542c2f4711a6591f3e8bde655b2f3419a96064453541d8c83f93501b876360ea57b681ed9dcc0a63810afa2a643d6b1c6fdd40df6