Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 17:28
Behavioral task
behavioral1
Sample
8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe
Resource
win10v2004-20241007-en
General
-
Target
8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe
-
Size
2.9MB
-
MD5
040b375855ea5ace05bcf21700b4a4d0
-
SHA1
37fddea16f6f496dff7bf28fdd74864846bb1db6
-
SHA256
8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbd
-
SHA512
e00191bad024e2bc2d971b85ba7a775ef31d7c5aa36a26fd9313ce64a2a8765eb9785a2c4b44e1e4ed75690116ca3a90b68307c61c1d1d9f83eb0d997727fbda
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHc:7v97AXmw4gxeOw46fUbNecCCFbNecN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00070000000194da-84.dat warzonerat behavioral1/files/0x000700000001949d-163.dat warzonerat behavioral1/files/0x00070000000194e4-186.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 13 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 40 IoCs
pid Process 2832 explorer.exe 2016 explorer.exe 1008 explorer.exe 1928 spoolsv.exe 1300 spoolsv.exe 1708 spoolsv.exe 2792 spoolsv.exe 2764 spoolsv.exe 2364 spoolsv.exe 2096 spoolsv.exe 1800 spoolsv.exe 2992 spoolsv.exe 1236 spoolsv.exe 864 spoolsv.exe 2952 spoolsv.exe 2340 spoolsv.exe 3036 spoolsv.exe 1828 spoolsv.exe 2280 spoolsv.exe 2704 spoolsv.exe 1732 spoolsv.exe 2096 spoolsv.exe 684 spoolsv.exe 808 spoolsv.exe 772 spoolsv.exe 2196 spoolsv.exe 804 spoolsv.exe 2616 spoolsv.exe 2552 spoolsv.exe 1636 spoolsv.exe 2028 spoolsv.exe 1740 spoolsv.exe 2064 spoolsv.exe 2908 spoolsv.exe 2740 spoolsv.exe 2596 spoolsv.exe 568 spoolsv.exe 1288 spoolsv.exe 484 spoolsv.exe 2604 spoolsv.exe -
Loads dropped DLL 59 IoCs
pid Process 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 1008 explorer.exe 1008 explorer.exe 1928 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1708 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2764 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2096 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2992 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 864 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2340 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1828 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2704 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2096 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 808 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2196 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2616 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1636 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1740 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2908 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2596 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1288 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 2604 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 2528 set thread context of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2900 set thread context of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 set thread context of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2832 set thread context of 2016 2832 explorer.exe 38 PID 2016 set thread context of 1008 2016 explorer.exe 40 PID 2016 set thread context of 1340 2016 explorer.exe 41 PID 1928 set thread context of 1300 1928 spoolsv.exe 45 PID 1708 set thread context of 2792 1708 spoolsv.exe 48 PID 2764 set thread context of 2364 2764 spoolsv.exe 51 PID 2096 set thread context of 1800 2096 spoolsv.exe 55 PID 2992 set thread context of 1236 2992 spoolsv.exe 58 PID 864 set thread context of 2952 864 spoolsv.exe 62 PID 2340 set thread context of 3036 2340 spoolsv.exe 65 PID 1828 set thread context of 2280 1828 spoolsv.exe 68 PID 2704 set thread context of 1732 2704 spoolsv.exe 72 PID 2096 set thread context of 684 2096 spoolsv.exe 76 PID 808 set thread context of 772 808 spoolsv.exe 80 PID 2196 set thread context of 804 2196 spoolsv.exe 84 PID 2616 set thread context of 2552 2616 spoolsv.exe 88 PID 1636 set thread context of 2028 1636 spoolsv.exe 92 PID 1740 set thread context of 2064 1740 spoolsv.exe 96 PID 2908 set thread context of 2740 2908 spoolsv.exe 100 PID 2596 set thread context of 568 2596 spoolsv.exe 104 PID 1288 set thread context of 484 1288 spoolsv.exe 108 -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2832 explorer.exe 1928 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1708 spoolsv.exe 1008 explorer.exe 2764 spoolsv.exe 1008 explorer.exe 2096 spoolsv.exe 1008 explorer.exe 2992 spoolsv.exe 1008 explorer.exe 864 spoolsv.exe 1008 explorer.exe 2340 spoolsv.exe 1008 explorer.exe 1828 spoolsv.exe 1008 explorer.exe 2704 spoolsv.exe 1008 explorer.exe 2096 spoolsv.exe 1008 explorer.exe 808 spoolsv.exe 1008 explorer.exe 2196 spoolsv.exe 1008 explorer.exe 2616 spoolsv.exe 1008 explorer.exe 1636 spoolsv.exe 1008 explorer.exe 1740 spoolsv.exe 1008 explorer.exe 2908 spoolsv.exe 1008 explorer.exe 2596 spoolsv.exe 1008 explorer.exe 1288 spoolsv.exe 1008 explorer.exe 2604 spoolsv.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 2832 explorer.exe 2832 explorer.exe 1008 explorer.exe 1008 explorer.exe 1928 spoolsv.exe 1928 spoolsv.exe 1008 explorer.exe 1008 explorer.exe 1708 spoolsv.exe 1708 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2096 spoolsv.exe 2096 spoolsv.exe 2992 spoolsv.exe 2992 spoolsv.exe 864 spoolsv.exe 864 spoolsv.exe 2340 spoolsv.exe 2340 spoolsv.exe 1828 spoolsv.exe 1828 spoolsv.exe 2704 spoolsv.exe 2704 spoolsv.exe 2096 spoolsv.exe 2096 spoolsv.exe 808 spoolsv.exe 808 spoolsv.exe 2196 spoolsv.exe 2196 spoolsv.exe 2616 spoolsv.exe 2616 spoolsv.exe 1636 spoolsv.exe 1636 spoolsv.exe 1740 spoolsv.exe 1740 spoolsv.exe 2908 spoolsv.exe 2908 spoolsv.exe 2596 spoolsv.exe 2596 spoolsv.exe 1288 spoolsv.exe 1288 spoolsv.exe 2604 spoolsv.exe 2604 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2212 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 30 PID 2528 wrote to memory of 2212 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 30 PID 2528 wrote to memory of 2212 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 30 PID 2528 wrote to memory of 2212 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 30 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2528 wrote to memory of 2900 2528 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 32 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2440 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 33 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2900 wrote to memory of 2084 2900 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 34 PID 2440 wrote to memory of 2832 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 35 PID 2440 wrote to memory of 2832 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 35 PID 2440 wrote to memory of 2832 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 35 PID 2440 wrote to memory of 2832 2440 8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe 35 PID 2832 wrote to memory of 1784 2832 explorer.exe 36 PID 2832 wrote to memory of 1784 2832 explorer.exe 36 PID 2832 wrote to memory of 1784 2832 explorer.exe 36 PID 2832 wrote to memory of 1784 2832 explorer.exe 36 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38 PID 2832 wrote to memory of 2016 2832 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe"C:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exeC:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exeC:\Users\Admin\AppData\Local\Temp\8dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbdN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1784
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2016 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2812
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2384
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1548
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1268
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1004
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1268
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2564
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1340
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5040b375855ea5ace05bcf21700b4a4d0
SHA137fddea16f6f496dff7bf28fdd74864846bb1db6
SHA2568dacf8a0cb1ff462e9b6836a6c21460856500bbdb177a12c078adf40c1d4bbbd
SHA512e00191bad024e2bc2d971b85ba7a775ef31d7c5aa36a26fd9313ce64a2a8765eb9785a2c4b44e1e4ed75690116ca3a90b68307c61c1d1d9f83eb0d997727fbda
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD5830361775014575d9e18d382bed938ad
SHA1f03dcc77cbb8c23a4fda860475cfa23edf026736
SHA2563c39b72f9b074d345648cd0bf5b45dbc4bd8061fc0caee3f4cdfb27c007222db
SHA512336af710bf7f8f4fa448011ba6992516dc6a1b67f13ae5349e699b1b65e000206fb235c15e647abb62486bd2f1341c2611515e8416fcd2f3693c3d0a243fe0bd
-
Filesize
2.9MB
MD58d091ac6a6a3be3dc853b79addf556a1
SHA12506dd63f9cfc08dfdca089c0622b8d9760f5186
SHA256b959792883988fc89e63c27d2ed0488e51520416333304943c2b9f1fd0c6876e
SHA512a6cf2a2a8da8b576efbce29191ce49d914c098fe005e0d016fac521429726693601afa37d7bf98a38becef287389c23689d01adc8cbb8b74e61ecd081c4c3e37