Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 08:40
Behavioral task
behavioral1
Sample
674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe
Resource
win10v2004-20241007-en
General
-
Target
674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe
-
Size
2.9MB
-
MD5
de6f57cea67bb0bd59574790217ff1e0
-
SHA1
dd628e6edf154b1e5e56d71cc9c6569e94944be3
-
SHA256
674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927a
-
SHA512
a4db14c9ce8f188f5f40a7427669e3b905390ee619c3aff35efa506f1839046462ac4caa583f1a52e9bd7314e1387af877af0755b092cba11a15b6b58ea55e59
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNec8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000019382-87.dat warzonerat behavioral1/files/0x0007000000019369-168.dat warzonerat behavioral1/files/0x000700000001938e-192.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 14 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 47 IoCs
pid Process 2440 explorer.exe 1228 explorer.exe 1300 explorer.exe 748 spoolsv.exe 3052 spoolsv.exe 1540 spoolsv.exe 2524 spoolsv.exe 2972 spoolsv.exe 2312 spoolsv.exe 1032 spoolsv.exe 548 spoolsv.exe 1516 spoolsv.exe 2892 spoolsv.exe 1672 spoolsv.exe 920 spoolsv.exe 1736 spoolsv.exe 2544 spoolsv.exe 684 spoolsv.exe 884 spoolsv.exe 2852 spoolsv.exe 2732 spoolsv.exe 916 spoolsv.exe 1716 spoolsv.exe 1660 spoolsv.exe 328 spoolsv.exe 2392 spoolsv.exe 1752 spoolsv.exe 1968 spoolsv.exe 2576 spoolsv.exe 992 spoolsv.exe 540 spoolsv.exe 2768 spoolsv.exe 2132 spoolsv.exe 2612 spoolsv.exe 2260 spoolsv.exe 2192 spoolsv.exe 628 spoolsv.exe 1700 spoolsv.exe 2296 spoolsv.exe 3036 spoolsv.exe 852 spoolsv.exe 2340 spoolsv.exe 2464 spoolsv.exe 2204 spoolsv.exe 2404 spoolsv.exe 2760 spoolsv.exe 2876 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 1300 explorer.exe 1300 explorer.exe 748 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1540 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2972 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1032 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1516 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1672 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1736 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 684 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2852 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 916 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1660 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2392 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1968 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 992 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2768 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2612 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2192 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1700 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 3036 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 2340 spoolsv.exe 1300 explorer.exe 1300 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 28 IoCs
description pid Process procid_target PID 2404 set thread context of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2176 set thread context of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 set thread context of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2440 set thread context of 1228 2440 explorer.exe 39 PID 1228 set thread context of 1300 1228 explorer.exe 40 PID 1228 set thread context of 1464 1228 explorer.exe 41 PID 748 set thread context of 3052 748 spoolsv.exe 45 PID 1540 set thread context of 2524 1540 spoolsv.exe 48 PID 2972 set thread context of 2312 2972 spoolsv.exe 51 PID 1032 set thread context of 548 1032 spoolsv.exe 55 PID 1516 set thread context of 2892 1516 spoolsv.exe 58 PID 1672 set thread context of 920 1672 spoolsv.exe 61 PID 1736 set thread context of 2544 1736 spoolsv.exe 65 PID 684 set thread context of 884 684 spoolsv.exe 68 PID 2852 set thread context of 2732 2852 spoolsv.exe 72 PID 916 set thread context of 1716 916 spoolsv.exe 75 PID 1660 set thread context of 328 1660 spoolsv.exe 79 PID 2392 set thread context of 1752 2392 spoolsv.exe 83 PID 1968 set thread context of 2576 1968 spoolsv.exe 87 PID 992 set thread context of 540 992 spoolsv.exe 91 PID 2768 set thread context of 2132 2768 spoolsv.exe 95 PID 2612 set thread context of 2260 2612 spoolsv.exe 99 PID 2192 set thread context of 628 2192 spoolsv.exe 103 PID 1700 set thread context of 2296 1700 spoolsv.exe 107 PID 3036 set thread context of 852 3036 spoolsv.exe 111 PID 2340 set thread context of 2464 2340 spoolsv.exe 115 PID 2204 set thread context of 2404 2204 spoolsv.exe 119 PID 2760 set thread context of 2876 2760 spoolsv.exe 123 -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2404-2-0x0000000001E00000-0x0000000001E46000-memory.dmp upx behavioral1/memory/2404-42-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0007000000019382-87.dat upx behavioral1/memory/2440-96-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2440-140-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0007000000019369-168.dat upx behavioral1/files/0x000700000001938e-192.dat upx behavioral1/memory/748-191-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1540-249-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/748-238-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2972-303-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1032-356-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1516-407-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1672-463-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1300-461-0x0000000002690000-0x00000000026D6000-memory.dmp upx -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2440 explorer.exe 748 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1540 spoolsv.exe 1300 explorer.exe 2972 spoolsv.exe 1300 explorer.exe 1032 spoolsv.exe 1300 explorer.exe 1516 spoolsv.exe 1300 explorer.exe 1672 spoolsv.exe 1300 explorer.exe 1736 spoolsv.exe 1300 explorer.exe 684 spoolsv.exe 1300 explorer.exe 2852 spoolsv.exe 1300 explorer.exe 916 spoolsv.exe 1300 explorer.exe 1660 spoolsv.exe 1300 explorer.exe 2392 spoolsv.exe 1300 explorer.exe 1968 spoolsv.exe 1300 explorer.exe 992 spoolsv.exe 1300 explorer.exe 2768 spoolsv.exe 1300 explorer.exe 2612 spoolsv.exe 1300 explorer.exe 2192 spoolsv.exe 1300 explorer.exe 1700 spoolsv.exe 1300 explorer.exe 3036 spoolsv.exe 1300 explorer.exe 2340 spoolsv.exe 1300 explorer.exe 2204 spoolsv.exe 1300 explorer.exe 2760 spoolsv.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 2440 explorer.exe 2440 explorer.exe 1300 explorer.exe 1300 explorer.exe 748 spoolsv.exe 748 spoolsv.exe 1300 explorer.exe 1300 explorer.exe 1540 spoolsv.exe 1540 spoolsv.exe 2972 spoolsv.exe 2972 spoolsv.exe 1032 spoolsv.exe 1032 spoolsv.exe 1516 spoolsv.exe 1516 spoolsv.exe 1672 spoolsv.exe 1672 spoolsv.exe 1736 spoolsv.exe 1736 spoolsv.exe 684 spoolsv.exe 684 spoolsv.exe 2852 spoolsv.exe 2852 spoolsv.exe 916 spoolsv.exe 916 spoolsv.exe 1660 spoolsv.exe 1660 spoolsv.exe 2392 spoolsv.exe 2392 spoolsv.exe 1968 spoolsv.exe 1968 spoolsv.exe 992 spoolsv.exe 992 spoolsv.exe 2768 spoolsv.exe 2768 spoolsv.exe 2612 spoolsv.exe 2612 spoolsv.exe 2192 spoolsv.exe 2192 spoolsv.exe 1700 spoolsv.exe 1700 spoolsv.exe 3036 spoolsv.exe 3036 spoolsv.exe 2340 spoolsv.exe 2340 spoolsv.exe 2204 spoolsv.exe 2204 spoolsv.exe 2760 spoolsv.exe 2760 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 320 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 30 PID 2404 wrote to memory of 320 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 30 PID 2404 wrote to memory of 320 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 30 PID 2404 wrote to memory of 320 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 30 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2404 wrote to memory of 2176 2404 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 32 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 2212 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 34 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2176 wrote to memory of 1456 2176 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 35 PID 2212 wrote to memory of 2440 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 36 PID 2212 wrote to memory of 2440 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 36 PID 2212 wrote to memory of 2440 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 36 PID 2212 wrote to memory of 2440 2212 674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe 36 PID 2440 wrote to memory of 1448 2440 explorer.exe 37 PID 2440 wrote to memory of 1448 2440 explorer.exe 37 PID 2440 wrote to memory of 1448 2440 explorer.exe 37 PID 2440 wrote to memory of 1448 2440 explorer.exe 37 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39 PID 2440 wrote to memory of 1228 2440 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe"C:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exeC:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exeC:\Users\Admin\AppData\Local\Temp\674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927aN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1448
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1228 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1300 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1984
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2984
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1580
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:884
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2848
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:672
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:584
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2224
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2656
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2440
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2292
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2388
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2756
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2588
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2876
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1464
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5de6f57cea67bb0bd59574790217ff1e0
SHA1dd628e6edf154b1e5e56d71cc9c6569e94944be3
SHA256674dd155dfb777f742928fa77a56e1399a5796d8801bec4bd0ac56e69f23927a
SHA512a4db14c9ce8f188f5f40a7427669e3b905390ee619c3aff35efa506f1839046462ac4caa583f1a52e9bd7314e1387af877af0755b092cba11a15b6b58ea55e59
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD58a385b1d401f070ec3e9047162e9624e
SHA1705b1dc79ca8f8ad6303521448704aff11676ff6
SHA25648b8abb9ae3c5d8f7bf25ea46db91c76a48a9737d7f6ccfab0da76906fff1f50
SHA512ae15ca00a792ea106953dfd15eba42ef8dc2589f942af0a5d0b7952a19d183c1998ccb080bd2880622b09f84ed4f969744bc4533e290a492fa2a0c5e796cb073
-
Filesize
2.9MB
MD59be5fee90d70bce6b5a9e5d208d56dda
SHA12681ad079d1b3be6561bd661d789f42c1789a652
SHA256dea5738f3907cc82c8b35aa9f9b311511edf014af93fe12648391d409817a94e
SHA51292e8f549c1075dd374677b763dffb8974560a99c43ed4bdfc54f02822a37608ab42655200f294f277abcda19f51a59169b9794942311c8765fc05de6e09193a1