Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 08:38
Behavioral task
behavioral1
Sample
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
Resource
win10v2004-20241007-en
General
-
Target
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
-
Size
2.9MB
-
MD5
45824c5f44b28f49d299db10996dce10
-
SHA1
90948e943179080047ebca8c2aa65f6b7e87de4b
-
SHA256
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9dd
-
SHA512
f506476619faccc065c20cbe842e60c4c7e259a3ab3d79ed5d26130c19b1bb47af558df300f858062a4c72c94b563a2e7cdfad40301e22b478e532992345d7fd
-
SSDEEP
24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:eTy7ASmw4gxeOw46fUbNecCCFbNecc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000018780-82.dat warzonerat behavioral1/files/0x0007000000018710-162.dat warzonerat behavioral1/files/0x0008000000018b62-184.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 17 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 44 IoCs
pid Process 2976 explorer.exe 2984 explorer.exe 2448 explorer.exe 2324 spoolsv.exe 1816 spoolsv.exe 2572 spoolsv.exe 2360 spoolsv.exe 2916 spoolsv.exe 2788 spoolsv.exe 2176 spoolsv.exe 2496 spoolsv.exe 2072 spoolsv.exe 2708 spoolsv.exe 2400 spoolsv.exe 848 spoolsv.exe 1636 spoolsv.exe 2600 spoolsv.exe 1660 spoolsv.exe 672 spoolsv.exe 884 spoolsv.exe 2612 spoolsv.exe 2668 spoolsv.exe 2152 spoolsv.exe 2968 spoolsv.exe 2860 spoolsv.exe 1968 spoolsv.exe 2252 spoolsv.exe 2948 spoolsv.exe 592 spoolsv.exe 2068 spoolsv.exe 2408 spoolsv.exe 1084 spoolsv.exe 2396 spoolsv.exe 2916 spoolsv.exe 2712 spoolsv.exe 1552 spoolsv.exe 2268 spoolsv.exe 2960 spoolsv.exe 588 spoolsv.exe 1404 spoolsv.exe 1368 spoolsv.exe 1348 spoolsv.exe 1144 spoolsv.exe 1608 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2448 explorer.exe 2448 explorer.exe 2324 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2572 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2916 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2176 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2072 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2400 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1636 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1660 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 884 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2668 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2968 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1968 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2948 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2068 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1084 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2916 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1552 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2960 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1404 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 1348 spoolsv.exe 2448 explorer.exe 2448 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2380 set thread context of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 1216 set thread context of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 set thread context of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 2976 set thread context of 2984 2976 explorer.exe 37 PID 2984 set thread context of 2448 2984 explorer.exe 38 PID 2984 set thread context of 2508 2984 explorer.exe 39 PID 2324 set thread context of 1816 2324 spoolsv.exe 43 PID 2572 set thread context of 2360 2572 spoolsv.exe 46 PID 2916 set thread context of 2788 2916 spoolsv.exe 50 PID 2176 set thread context of 2496 2176 spoolsv.exe 54 PID 2072 set thread context of 2708 2072 spoolsv.exe 58 PID 2400 set thread context of 848 2400 spoolsv.exe 62 PID 1636 set thread context of 2600 1636 spoolsv.exe 66 PID 1660 set thread context of 672 1660 spoolsv.exe 70 PID 884 set thread context of 2612 884 spoolsv.exe 74 PID 2668 set thread context of 2152 2668 spoolsv.exe 78 PID 2968 set thread context of 2860 2968 spoolsv.exe 82 PID 1968 set thread context of 2252 1968 spoolsv.exe 86 PID 2948 set thread context of 592 2948 spoolsv.exe 90 PID 2068 set thread context of 2408 2068 spoolsv.exe 94 PID 1084 set thread context of 2396 1084 spoolsv.exe 98 PID 2916 set thread context of 2712 2916 spoolsv.exe 102 PID 1552 set thread context of 2268 1552 spoolsv.exe 106 PID 2960 set thread context of 588 2960 spoolsv.exe 110 PID 1404 set thread context of 1368 1404 spoolsv.exe 114 PID 1348 set thread context of 1144 1348 spoolsv.exe 118 -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2976 explorer.exe 2324 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2572 spoolsv.exe 2448 explorer.exe 2916 spoolsv.exe 2448 explorer.exe 2176 spoolsv.exe 2448 explorer.exe 2072 spoolsv.exe 2448 explorer.exe 2400 spoolsv.exe 2448 explorer.exe 1636 spoolsv.exe 2448 explorer.exe 1660 spoolsv.exe 2448 explorer.exe 884 spoolsv.exe 2448 explorer.exe 2668 spoolsv.exe 2448 explorer.exe 2968 spoolsv.exe 2448 explorer.exe 1968 spoolsv.exe 2448 explorer.exe 2948 spoolsv.exe 2448 explorer.exe 2068 spoolsv.exe 2448 explorer.exe 1084 spoolsv.exe 2448 explorer.exe 2916 spoolsv.exe 2448 explorer.exe 1552 spoolsv.exe 2448 explorer.exe 2960 spoolsv.exe 2448 explorer.exe 1404 spoolsv.exe 2448 explorer.exe 1348 spoolsv.exe 2448 explorer.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 2976 explorer.exe 2976 explorer.exe 2448 explorer.exe 2448 explorer.exe 2324 spoolsv.exe 2324 spoolsv.exe 2448 explorer.exe 2448 explorer.exe 2572 spoolsv.exe 2572 spoolsv.exe 2916 spoolsv.exe 2916 spoolsv.exe 2176 spoolsv.exe 2176 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2400 spoolsv.exe 2400 spoolsv.exe 1636 spoolsv.exe 1636 spoolsv.exe 1660 spoolsv.exe 1660 spoolsv.exe 884 spoolsv.exe 884 spoolsv.exe 2668 spoolsv.exe 2668 spoolsv.exe 2968 spoolsv.exe 2968 spoolsv.exe 1968 spoolsv.exe 1968 spoolsv.exe 2948 spoolsv.exe 2948 spoolsv.exe 2068 spoolsv.exe 2068 spoolsv.exe 1084 spoolsv.exe 1084 spoolsv.exe 2916 spoolsv.exe 2916 spoolsv.exe 1552 spoolsv.exe 1552 spoolsv.exe 2960 spoolsv.exe 2960 spoolsv.exe 1404 spoolsv.exe 1404 spoolsv.exe 1348 spoolsv.exe 1348 spoolsv.exe 1608 spoolsv.exe 1608 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1740 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 29 PID 2380 wrote to memory of 1740 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 29 PID 2380 wrote to memory of 1740 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 29 PID 2380 wrote to memory of 1740 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 29 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 2380 wrote to memory of 1216 2380 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 31 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2144 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 32 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 1216 wrote to memory of 2180 1216 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 33 PID 2144 wrote to memory of 2976 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 34 PID 2144 wrote to memory of 2976 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 34 PID 2144 wrote to memory of 2976 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 34 PID 2144 wrote to memory of 2976 2144 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 34 PID 2976 wrote to memory of 1112 2976 explorer.exe 35 PID 2976 wrote to memory of 1112 2976 explorer.exe 35 PID 2976 wrote to memory of 1112 2976 explorer.exe 35 PID 2976 wrote to memory of 1112 2976 explorer.exe 35 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37 PID 2976 wrote to memory of 2984 2976 explorer.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe"C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exeC:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exeC:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1112
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2984 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2448 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2308
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:112
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2356
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2588
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1768
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2908
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1712
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2336
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1784
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2528
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1912
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2380
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2176
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1992
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1716
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2508
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD545824c5f44b28f49d299db10996dce10
SHA190948e943179080047ebca8c2aa65f6b7e87de4b
SHA2567e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9dd
SHA512f506476619faccc065c20cbe842e60c4c7e259a3ab3d79ed5d26130c19b1bb47af558df300f858062a4c72c94b563a2e7cdfad40301e22b478e532992345d7fd
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD56019b69690b983918aae25f52e74d33e
SHA19ec0e5f38b1f4e34c98c56721ca0d1b6c05a5cd4
SHA256cb1b2906d153eb9cf8d93c642b008d6dee5d73beac14af35301d8ed926ad8e46
SHA5120d89105a2246b45169733167ade2bcb34842c19c6849949106a0f9cec7139ba1aecab02ee0a1c8b87cf94214875ddc832d2f5c4f8a25c472075d9decbf1ee4a9
-
Filesize
2.9MB
MD5febbd6e44796df66042f8d892a4ee561
SHA114209d16bade29a2754960e79fd7cec19e3c5223
SHA25610759928815525f34935883ab4ad79f777ad09204a05a087ed342bc7b1077aa9
SHA5122e41aced74d48b972e7608944c6c8c3f7248ea3c8b65b798eccb4bc38ae4a3caa99776c6348724e79dd95a9facc25d3cd3ee759213c8d0737f30bc3fdaaddb91