Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 14:07
Behavioral task
behavioral1
Sample
016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe
Resource
win10v2004-20241007-en
General
-
Target
016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe
-
Size
2.9MB
-
MD5
7977647539ebbde92a40ef2ccdff1fd0
-
SHA1
89e96806ed3edb4d6a5e268662345062db6e0e6c
-
SHA256
016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0
-
SHA512
6144863bbdcb8f5bef1c4dc7e43b7509bfc0ad9700f46933eee0b9b993973eeb1b10d0804abb5c9e117b64ff9e1d4e8a3dcc691ac2fa28e93f62a0733012dd07
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHk:7v97AXmw4gxeOw46fUbNecCCFbNecZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000700000001873d-85.dat warzonerat behavioral1/files/0x00070000000186fd-163.dat warzonerat behavioral1/files/0x000700000001878f-180.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 15 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 52 IoCs
pid Process 2972 explorer.exe 2828 explorer.exe 856 explorer.exe 1564 spoolsv.exe 2964 spoolsv.exe 1584 spoolsv.exe 2448 spoolsv.exe 892 spoolsv.exe 2648 spoolsv.exe 2296 spoolsv.exe 1420 spoolsv.exe 1148 spoolsv.exe 2312 spoolsv.exe 308 spoolsv.exe 996 spoolsv.exe 1712 spoolsv.exe 1784 spoolsv.exe 780 spoolsv.exe 2592 spoolsv.exe 1544 spoolsv.exe 1048 spoolsv.exe 2112 spoolsv.exe 2708 spoolsv.exe 2988 spoolsv.exe 2180 spoolsv.exe 1328 spoolsv.exe 2108 spoolsv.exe 3068 spoolsv.exe 2700 spoolsv.exe 1156 spoolsv.exe 1724 spoolsv.exe 2336 spoolsv.exe 2012 spoolsv.exe 2476 spoolsv.exe 1108 spoolsv.exe 2404 spoolsv.exe 2856 spoolsv.exe 2144 spoolsv.exe 2372 spoolsv.exe 2424 spoolsv.exe 708 spoolsv.exe 1360 spoolsv.exe 1072 spoolsv.exe 264 spoolsv.exe 2956 spoolsv.exe 2928 spoolsv.exe 980 spoolsv.exe 1180 spoolsv.exe 1992 spoolsv.exe 2268 spoolsv.exe 1632 spoolsv.exe 988 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 856 explorer.exe 856 explorer.exe 1564 spoolsv.exe 856 explorer.exe 856 explorer.exe 1584 spoolsv.exe 856 explorer.exe 856 explorer.exe 892 spoolsv.exe 856 explorer.exe 856 explorer.exe 2296 spoolsv.exe 856 explorer.exe 856 explorer.exe 1148 spoolsv.exe 856 explorer.exe 856 explorer.exe 308 spoolsv.exe 856 explorer.exe 856 explorer.exe 1712 spoolsv.exe 856 explorer.exe 856 explorer.exe 780 spoolsv.exe 856 explorer.exe 856 explorer.exe 1544 spoolsv.exe 856 explorer.exe 856 explorer.exe 2112 spoolsv.exe 856 explorer.exe 856 explorer.exe 2988 spoolsv.exe 856 explorer.exe 856 explorer.exe 1328 spoolsv.exe 856 explorer.exe 856 explorer.exe 3068 spoolsv.exe 856 explorer.exe 856 explorer.exe 1156 spoolsv.exe 856 explorer.exe 856 explorer.exe 2336 spoolsv.exe 856 explorer.exe 856 explorer.exe 2476 spoolsv.exe 856 explorer.exe 856 explorer.exe 2404 spoolsv.exe 856 explorer.exe 856 explorer.exe 2144 spoolsv.exe 856 explorer.exe 856 explorer.exe 2424 spoolsv.exe 856 explorer.exe 856 explorer.exe 1360 spoolsv.exe 856 explorer.exe 856 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe -
Suspicious use of SetThreadContext 30 IoCs
description pid Process procid_target PID 2196 set thread context of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2316 set thread context of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 set thread context of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2972 set thread context of 2828 2972 explorer.exe 39 PID 2828 set thread context of 856 2828 explorer.exe 40 PID 2828 set thread context of 1144 2828 explorer.exe 41 PID 1564 set thread context of 2964 1564 spoolsv.exe 45 PID 1584 set thread context of 2448 1584 spoolsv.exe 48 PID 892 set thread context of 2648 892 spoolsv.exe 52 PID 2296 set thread context of 1420 2296 spoolsv.exe 56 PID 1148 set thread context of 2312 1148 spoolsv.exe 60 PID 308 set thread context of 996 308 spoolsv.exe 64 PID 1712 set thread context of 1784 1712 spoolsv.exe 67 PID 780 set thread context of 2592 780 spoolsv.exe 71 PID 1544 set thread context of 1048 1544 spoolsv.exe 75 PID 2112 set thread context of 2708 2112 spoolsv.exe 79 PID 2988 set thread context of 2180 2988 spoolsv.exe 83 PID 1328 set thread context of 2108 1328 spoolsv.exe 87 PID 3068 set thread context of 2700 3068 spoolsv.exe 91 PID 1156 set thread context of 1724 1156 spoolsv.exe 95 PID 2336 set thread context of 2012 2336 spoolsv.exe 99 PID 2476 set thread context of 1108 2476 spoolsv.exe 103 PID 2404 set thread context of 2856 2404 spoolsv.exe 107 PID 2144 set thread context of 2372 2144 spoolsv.exe 111 PID 2424 set thread context of 708 2424 spoolsv.exe 115 PID 1360 set thread context of 1072 1360 spoolsv.exe 119 PID 264 set thread context of 2956 264 spoolsv.exe 123 PID 2928 set thread context of 980 2928 spoolsv.exe 127 PID 1180 set thread context of 1992 1180 spoolsv.exe 131 PID 2268 set thread context of 1632 2268 spoolsv.exe 135 -
Drops file in Windows directory 29 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2972 explorer.exe 1564 spoolsv.exe 856 explorer.exe 856 explorer.exe 1584 spoolsv.exe 856 explorer.exe 892 spoolsv.exe 856 explorer.exe 2296 spoolsv.exe 856 explorer.exe 1148 spoolsv.exe 856 explorer.exe 308 spoolsv.exe 856 explorer.exe 1712 spoolsv.exe 856 explorer.exe 780 spoolsv.exe 856 explorer.exe 1544 spoolsv.exe 856 explorer.exe 2112 spoolsv.exe 856 explorer.exe 2988 spoolsv.exe 856 explorer.exe 1328 spoolsv.exe 856 explorer.exe 3068 spoolsv.exe 856 explorer.exe 1156 spoolsv.exe 856 explorer.exe 2336 spoolsv.exe 856 explorer.exe 2476 spoolsv.exe 856 explorer.exe 2404 spoolsv.exe 856 explorer.exe 2144 spoolsv.exe 856 explorer.exe 2424 spoolsv.exe 856 explorer.exe 1360 spoolsv.exe 856 explorer.exe 264 spoolsv.exe 856 explorer.exe 2928 spoolsv.exe 856 explorer.exe 1180 spoolsv.exe 856 explorer.exe 2268 spoolsv.exe 856 explorer.exe -
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 2972 explorer.exe 2972 explorer.exe 856 explorer.exe 856 explorer.exe 1564 spoolsv.exe 1564 spoolsv.exe 856 explorer.exe 856 explorer.exe 1584 spoolsv.exe 1584 spoolsv.exe 892 spoolsv.exe 892 spoolsv.exe 2296 spoolsv.exe 2296 spoolsv.exe 1148 spoolsv.exe 1148 spoolsv.exe 308 spoolsv.exe 308 spoolsv.exe 1712 spoolsv.exe 1712 spoolsv.exe 780 spoolsv.exe 780 spoolsv.exe 1544 spoolsv.exe 1544 spoolsv.exe 2112 spoolsv.exe 2112 spoolsv.exe 2988 spoolsv.exe 2988 spoolsv.exe 1328 spoolsv.exe 1328 spoolsv.exe 3068 spoolsv.exe 3068 spoolsv.exe 1156 spoolsv.exe 1156 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2476 spoolsv.exe 2476 spoolsv.exe 2404 spoolsv.exe 2404 spoolsv.exe 2144 spoolsv.exe 2144 spoolsv.exe 2424 spoolsv.exe 2424 spoolsv.exe 1360 spoolsv.exe 1360 spoolsv.exe 264 spoolsv.exe 264 spoolsv.exe 2928 spoolsv.exe 2928 spoolsv.exe 1180 spoolsv.exe 1180 spoolsv.exe 2268 spoolsv.exe 2268 spoolsv.exe 988 spoolsv.exe 988 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2208 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 30 PID 2196 wrote to memory of 2208 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 30 PID 2196 wrote to memory of 2208 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 30 PID 2196 wrote to memory of 2208 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 30 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2196 wrote to memory of 2316 2196 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 32 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 2740 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 34 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2316 wrote to memory of 1028 2316 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 35 PID 2740 wrote to memory of 2972 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 36 PID 2740 wrote to memory of 2972 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 36 PID 2740 wrote to memory of 2972 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 36 PID 2740 wrote to memory of 2972 2740 016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe 36 PID 2972 wrote to memory of 2688 2972 explorer.exe 37 PID 2972 wrote to memory of 2688 2972 explorer.exe 37 PID 2972 wrote to memory of 2688 2972 explorer.exe 37 PID 2972 wrote to memory of 2688 2972 explorer.exe 37 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39 PID 2972 wrote to memory of 2828 2972 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe"C:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exeC:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exeC:\Users\Admin\AppData\Local\Temp\016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0N.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2688
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2828 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:856 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1468
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2556
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1900
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1688
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1332
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2456
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2840
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2260
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2128
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:708
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2300
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2484
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2516
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1300
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1144
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1028
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD57977647539ebbde92a40ef2ccdff1fd0
SHA189e96806ed3edb4d6a5e268662345062db6e0e6c
SHA256016ed73b472e89b18429400963f8aec46e3f1054fbb6dac5d478958a63c854b0
SHA5126144863bbdcb8f5bef1c4dc7e43b7509bfc0ad9700f46933eee0b9b993973eeb1b10d0804abb5c9e117b64ff9e1d4e8a3dcc691ac2fa28e93f62a0733012dd07
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD5d63ca33e2400d639d0d2a22b47c2484f
SHA1318637ebef2c3b0be85c4597d05b31921aeb4cd3
SHA2566ff5720ff5686a8351ea388e04454e7f74ed0a0c23fc28e7b593372c45db5de5
SHA512fb835800781df0a691c917e026d56cf904a019a1792f72059583add433c274fa33edd35b1c4bc06b888eafc245d5934ba5a2f2f60663ff0ab323efa83a5b5fa7
-
Filesize
2.9MB
MD52ca9a4d986092121ec4970225a6fce51
SHA14b1b7269aef453ada1b1be43f89be625ff7711cb
SHA256c4d76fb892f6c5da98b66c22bceba821121288c348d548c7a3f0ac0e33df2fe9
SHA5128ca1f95d6825ca48323585c97c3f08a06692e9783d916ad5b949a0fde8fb7e0018b69b4531b2b6a0a816cf17bce844f02a5a7d8d410f6c19b3d23965ea0a138f