Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 04:47
Behavioral task
behavioral1
Sample
8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe
Resource
win10v2004-20241007-en
General
-
Target
8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe
-
Size
2.9MB
-
MD5
b0c095a436e11e24aae447ef1567f070
-
SHA1
76630eade62af00f02dfb6e652449ab0a81a9138
-
SHA256
8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328f
-
SHA512
478d99540881de4e7a567d7205c55e3ac54d58a24b2e4213331a72df749e8f2ae3ad41c439baefc207b23961fa7f0eb0a4403237869ba58b52f26e1b12ac1e3d
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH3:7v97AXmw4gxeOw46fUbNecCCFbNecw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023b99-33.dat warzonerat behavioral2/files/0x000b000000023b97-58.dat warzonerat behavioral2/files/0x0004000000000711-73.dat warzonerat behavioral2/files/0x0004000000000711-306.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 20 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 39 IoCs
pid Process 892 explorer.exe 5008 explorer.exe 4656 explorer.exe 5072 spoolsv.exe 212 spoolsv.exe 468 spoolsv.exe 1672 spoolsv.exe 4352 spoolsv.exe 4836 spoolsv.exe 372 spoolsv.exe 2080 spoolsv.exe 4376 spoolsv.exe 3472 spoolsv.exe 3932 spoolsv.exe 3032 spoolsv.exe 4552 spoolsv.exe 4472 spoolsv.exe 4060 spoolsv.exe 1404 spoolsv.exe 1328 spoolsv.exe 3700 spoolsv.exe 1056 spoolsv.exe 540 spoolsv.exe 2824 spoolsv.exe 3860 spoolsv.exe 4824 spoolsv.exe 4584 spoolsv.exe 3232 spoolsv.exe 4652 spoolsv.exe 3704 spoolsv.exe 1572 spoolsv.exe 4528 spoolsv.exe 2676 spoolsv.exe 1972 spoolsv.exe 4352 spoolsv.exe 4560 spoolsv.exe 4960 spoolsv.exe 2160 spoolsv.exe 2924 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 3092 set thread context of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 336 set thread context of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 set thread context of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 892 set thread context of 5008 892 explorer.exe 99 PID 5008 set thread context of 4656 5008 explorer.exe 100 PID 5008 set thread context of 1200 5008 explorer.exe 101 PID 5072 set thread context of 212 5072 spoolsv.exe 105 PID 468 set thread context of 1672 468 spoolsv.exe 109 PID 4352 set thread context of 4836 4352 spoolsv.exe 113 PID 372 set thread context of 2080 372 spoolsv.exe 117 PID 4376 set thread context of 3472 4376 spoolsv.exe 121 PID 3932 set thread context of 3032 3932 spoolsv.exe 125 PID 4552 set thread context of 4472 4552 spoolsv.exe 129 PID 4060 set thread context of 1404 4060 spoolsv.exe 133 PID 1328 set thread context of 3700 1328 spoolsv.exe 137 PID 1056 set thread context of 540 1056 spoolsv.exe 141 PID 2824 set thread context of 3860 2824 spoolsv.exe 145 PID 4824 set thread context of 4584 4824 spoolsv.exe 149 PID 3232 set thread context of 4652 3232 spoolsv.exe 153 PID 3704 set thread context of 1572 3704 spoolsv.exe 157 PID 4528 set thread context of 2676 4528 spoolsv.exe 161 PID 1972 set thread context of 4352 1972 spoolsv.exe 165 PID 4560 set thread context of 4960 4560 spoolsv.exe 169 PID 2160 set thread context of 2924 2160 spoolsv.exe 173 -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 61 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 892 explorer.exe 892 explorer.exe 5072 spoolsv.exe 5072 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4656 explorer.exe 4656 explorer.exe 468 spoolsv.exe 468 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4352 spoolsv.exe 4352 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 372 spoolsv.exe 372 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4376 spoolsv.exe 4376 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 3932 spoolsv.exe 3932 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4552 spoolsv.exe 4552 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4060 spoolsv.exe 4060 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 1328 spoolsv.exe 1328 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 1056 spoolsv.exe 1056 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 2824 spoolsv.exe 2824 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 4824 spoolsv.exe 4824 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 3232 spoolsv.exe 3232 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 3704 spoolsv.exe 3704 spoolsv.exe 4656 explorer.exe 4656 explorer.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 892 explorer.exe 892 explorer.exe 4656 explorer.exe 4656 explorer.exe 5072 spoolsv.exe 5072 spoolsv.exe 4656 explorer.exe 4656 explorer.exe 468 spoolsv.exe 468 spoolsv.exe 4352 spoolsv.exe 4352 spoolsv.exe 372 spoolsv.exe 372 spoolsv.exe 4376 spoolsv.exe 4376 spoolsv.exe 3932 spoolsv.exe 3932 spoolsv.exe 4552 spoolsv.exe 4552 spoolsv.exe 4060 spoolsv.exe 4060 spoolsv.exe 1328 spoolsv.exe 1328 spoolsv.exe 1056 spoolsv.exe 1056 spoolsv.exe 2824 spoolsv.exe 2824 spoolsv.exe 4824 spoolsv.exe 4824 spoolsv.exe 3232 spoolsv.exe 3232 spoolsv.exe 3704 spoolsv.exe 3704 spoolsv.exe 4528 spoolsv.exe 4528 spoolsv.exe 1972 spoolsv.exe 1972 spoolsv.exe 4560 spoolsv.exe 4560 spoolsv.exe 2160 spoolsv.exe 2160 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4432 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 82 PID 3092 wrote to memory of 4432 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 82 PID 3092 wrote to memory of 4432 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 82 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 3092 wrote to memory of 336 3092 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 84 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 1588 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 94 PID 336 wrote to memory of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 336 wrote to memory of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 336 wrote to memory of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 336 wrote to memory of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 336 wrote to memory of 3404 336 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 95 PID 1588 wrote to memory of 892 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 96 PID 1588 wrote to memory of 892 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 96 PID 1588 wrote to memory of 892 1588 8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe 96 PID 892 wrote to memory of 4416 892 explorer.exe 97 PID 892 wrote to memory of 4416 892 explorer.exe 97 PID 892 wrote to memory of 4416 892 explorer.exe 97 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99 PID 892 wrote to memory of 5008 892 explorer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe"C:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exeC:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exeC:\Users\Admin\AppData\Local\Temp\8c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328fN.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4416
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5008 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4656 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2244
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2376
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1224
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3164
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4384
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4128
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4368
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4568
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3440
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3748
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4640
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2904
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3188
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:2256
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1200
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:3404
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5b0c095a436e11e24aae447ef1567f070
SHA176630eade62af00f02dfb6e652449ab0a81a9138
SHA2568c87ef2b640ee3dd6c4a1cbb14eb7eb72cb4f183639c5d43fa7aa954a736328f
SHA512478d99540881de4e7a567d7205c55e3ac54d58a24b2e4213331a72df749e8f2ae3ad41c439baefc207b23961fa7f0eb0a4403237869ba58b52f26e1b12ac1e3d
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD52396deb89ba879b3ad7d7d2c298291a0
SHA1e0677b2002fba36b6abd9346332437f42e26426e
SHA2565f2ebfbe77f3990c1dfbf40ea61f2dae68840358c55711a6d6f20e0457586354
SHA5121ef41b5c326c9a9178c750fc68bbb649c58182dd8d414dbb734a59481a18d63dfcc2f3b49f231bb7da62893a12c6f422fc210415b5b26673fb29f9b30dc844a1
-
Filesize
1.4MB
MD57135fd6a408810a97b6f791148381b2b
SHA159cc97498781d9d6dc1137b5bc87e6af4a601e1c
SHA256b90a3e0d261bc8e508017c0d3a92c7b69b004a398a97c638d7e362435b7fe08d
SHA512af665b2652404f5023153d78fdd1fa23e64ea0e413b7d8095d483c0d021809648071355f53ece51d9d3a8bb124ad0165f8fd9c7fdd068fbeff1bf84942163e68
-
Filesize
2.9MB
MD526e445511830a9856d0b64446bc2ea1c
SHA1748e67594947937c63cef37f4ee0be8d2aab954b
SHA256dddc3d369e76ff8bae57113b230e83454c05d9e0ad3ecb4b9165e8cad22387f4
SHA512b39b6d3f444b410937dd099a34d2a772b59106fb4a372859a86035a8af828a5c920d673e4975a696900592eac41f91ad316c977c5f06ef55e35b719a43832919