Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 21:28
Behavioral task
behavioral1
Sample
9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe
Resource
win10v2004-20241007-en
General
-
Target
9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe
-
Size
2.9MB
-
MD5
257f0f85e4bafd14c0f1be98866003d0
-
SHA1
37644a2bfdbd33920efc7808e6c13358d8505911
-
SHA256
9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66
-
SHA512
abfee0a0c1fada9415f63e3eed703b34e5e06215f36daf6638dac50ad479938bc9eac00d6d1caa81e00621849285aa436db1dc284a25828eeb6da0ac15b5ad84
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHC:7v97AXmw4gxeOw46fUbNecCCFbNec3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023ca0-33.dat warzonerat behavioral2/files/0x0008000000023c9e-59.dat warzonerat behavioral2/files/0x0004000000000707-76.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 21 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 40 IoCs
pid Process 2356 explorer.exe 4752 explorer.exe 4292 explorer.exe 1300 spoolsv.exe 3060 spoolsv.exe 3728 spoolsv.exe 4432 spoolsv.exe 5056 spoolsv.exe 712 spoolsv.exe 4664 spoolsv.exe 4232 spoolsv.exe 4812 spoolsv.exe 4800 spoolsv.exe 5052 spoolsv.exe 1248 spoolsv.exe 2644 spoolsv.exe 1644 spoolsv.exe 2260 spoolsv.exe 468 spoolsv.exe 4376 spoolsv.exe 3744 spoolsv.exe 3116 spoolsv.exe 5040 spoolsv.exe 3696 spoolsv.exe 4488 spoolsv.exe 2968 spoolsv.exe 3140 spoolsv.exe 1320 spoolsv.exe 3248 spoolsv.exe 3972 spoolsv.exe 2540 spoolsv.exe 4448 spoolsv.exe 1964 spoolsv.exe 4660 spoolsv.exe 3720 spoolsv.exe 4536 spoolsv.exe 1296 spoolsv.exe 4404 spoolsv.exe 4908 spoolsv.exe 4412 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 212 set thread context of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 3020 set thread context of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 set thread context of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 2356 set thread context of 4752 2356 explorer.exe 99 PID 4752 set thread context of 4292 4752 explorer.exe 100 PID 4752 set thread context of 768 4752 explorer.exe 101 PID 1300 set thread context of 3060 1300 spoolsv.exe 105 PID 3728 set thread context of 4432 3728 spoolsv.exe 109 PID 5056 set thread context of 712 5056 spoolsv.exe 113 PID 4664 set thread context of 4232 4664 spoolsv.exe 117 PID 4812 set thread context of 4800 4812 spoolsv.exe 121 PID 5052 set thread context of 1248 5052 spoolsv.exe 125 PID 2644 set thread context of 1644 2644 spoolsv.exe 129 PID 2260 set thread context of 468 2260 spoolsv.exe 133 PID 4376 set thread context of 3744 4376 spoolsv.exe 137 PID 3116 set thread context of 5040 3116 spoolsv.exe 141 PID 3696 set thread context of 4488 3696 spoolsv.exe 145 PID 2968 set thread context of 3140 2968 spoolsv.exe 149 PID 1320 set thread context of 3248 1320 spoolsv.exe 153 PID 3972 set thread context of 2540 3972 spoolsv.exe 157 PID 4448 set thread context of 1964 4448 spoolsv.exe 161 PID 4660 set thread context of 3720 4660 spoolsv.exe 165 PID 4536 set thread context of 1296 4536 spoolsv.exe 169 PID 4404 set thread context of 4908 4404 spoolsv.exe 173 -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 2356 explorer.exe 2356 explorer.exe 1300 spoolsv.exe 1300 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 4292 explorer.exe 4292 explorer.exe 3728 spoolsv.exe 3728 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 5056 spoolsv.exe 5056 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 4664 spoolsv.exe 4664 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 4812 spoolsv.exe 4812 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 5052 spoolsv.exe 5052 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 2644 spoolsv.exe 2644 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 2260 spoolsv.exe 2260 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 4376 spoolsv.exe 4376 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 3116 spoolsv.exe 3116 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 3696 spoolsv.exe 3696 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 2968 spoolsv.exe 2968 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 1320 spoolsv.exe 1320 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 3972 spoolsv.exe 3972 spoolsv.exe 4292 explorer.exe 4292 explorer.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 2356 explorer.exe 2356 explorer.exe 4292 explorer.exe 4292 explorer.exe 1300 spoolsv.exe 1300 spoolsv.exe 4292 explorer.exe 4292 explorer.exe 3728 spoolsv.exe 3728 spoolsv.exe 5056 spoolsv.exe 5056 spoolsv.exe 4664 spoolsv.exe 4664 spoolsv.exe 4812 spoolsv.exe 4812 spoolsv.exe 5052 spoolsv.exe 5052 spoolsv.exe 2644 spoolsv.exe 2644 spoolsv.exe 2260 spoolsv.exe 2260 spoolsv.exe 4376 spoolsv.exe 4376 spoolsv.exe 3116 spoolsv.exe 3116 spoolsv.exe 3696 spoolsv.exe 3696 spoolsv.exe 2968 spoolsv.exe 2968 spoolsv.exe 1320 spoolsv.exe 1320 spoolsv.exe 3972 spoolsv.exe 3972 spoolsv.exe 4448 spoolsv.exe 4448 spoolsv.exe 4660 spoolsv.exe 4660 spoolsv.exe 4536 spoolsv.exe 4536 spoolsv.exe 4404 spoolsv.exe 4404 spoolsv.exe 4412 spoolsv.exe 4412 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 3552 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 82 PID 212 wrote to memory of 3552 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 82 PID 212 wrote to memory of 3552 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 82 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 212 wrote to memory of 3020 212 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 84 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 840 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 94 PID 3020 wrote to memory of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 3020 wrote to memory of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 3020 wrote to memory of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 3020 wrote to memory of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 3020 wrote to memory of 2652 3020 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 95 PID 840 wrote to memory of 2356 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 96 PID 840 wrote to memory of 2356 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 96 PID 840 wrote to memory of 2356 840 9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe 96 PID 2356 wrote to memory of 2144 2356 explorer.exe 97 PID 2356 wrote to memory of 2144 2356 explorer.exe 97 PID 2356 wrote to memory of 2144 2356 explorer.exe 97 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99 PID 2356 wrote to memory of 4752 2356 explorer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe"C:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exeC:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exeC:\Users\Admin\AppData\Local\Temp\9342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66N.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2144
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4752 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4292 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3700
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1556
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3516
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3988
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1032
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1248
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1336
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:468
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4172
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2412
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4644
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:796
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2104
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3248
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3976
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3720
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4372
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4196
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:768
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5257f0f85e4bafd14c0f1be98866003d0
SHA137644a2bfdbd33920efc7808e6c13358d8505911
SHA2569342400b094113e8cce70d33dc76ac4fceb450478b99d69198f094124c7fcf66
SHA512abfee0a0c1fada9415f63e3eed703b34e5e06215f36daf6638dac50ad479938bc9eac00d6d1caa81e00621849285aa436db1dc284a25828eeb6da0ac15b5ad84
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5c7e648b8fde4fbe31647a5a58c30d98d
SHA167ca3c0b011c8feac21fd58b10437c0a768ea3fa
SHA256f4ba181537a695d20da3072ef0a0dec69a895575ea81e359c11d9b8d191b5c7f
SHA51264cdacd8cd3ed63a52551be354403e7a12c52cb3773152d8226b6cdb1169f200c3ee0654913d6892b0b8243f12f929f734216f3f5f247cf141d1eb5ba43acbf8
-
Filesize
2.9MB
MD5328dd3027bac6b55726cc05daa8af6df
SHA11390818bd6bdefaa39772082b2e8f90124dadc96
SHA256f25c010daa504e295b146e05213ed215265279dafe55039f54c1adddc644ecb7
SHA5122647b0b1f03bef64c109f7781b711a697cd32e14b32bcbc28d9dfb2ddd246b69fce825d5111c21228b63a1834e2e6154c6adeb35a35d9f753a4f4f4cfe28f642