Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 08:38
Behavioral task
behavioral1
Sample
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
Resource
win10v2004-20241007-en
General
-
Target
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe
-
Size
2.9MB
-
MD5
45824c5f44b28f49d299db10996dce10
-
SHA1
90948e943179080047ebca8c2aa65f6b7e87de4b
-
SHA256
7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9dd
-
SHA512
f506476619faccc065c20cbe842e60c4c7e259a3ab3d79ed5d26130c19b1bb47af558df300f858062a4c72c94b563a2e7cdfad40301e22b478e532992345d7fd
-
SSDEEP
24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:eTy7ASmw4gxeOw46fUbNecCCFbNecc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023c44-34.dat warzonerat behavioral2/files/0x0017000000023c3a-59.dat warzonerat behavioral2/files/0x000400000000070f-73.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 21 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 40 IoCs
pid Process 972 explorer.exe 1868 explorer.exe 3904 explorer.exe 4448 spoolsv.exe 1676 spoolsv.exe 4124 spoolsv.exe 5020 spoolsv.exe 4132 spoolsv.exe 1916 spoolsv.exe 4000 spoolsv.exe 2828 spoolsv.exe 2684 spoolsv.exe 3140 spoolsv.exe 1604 spoolsv.exe 4024 spoolsv.exe 4464 spoolsv.exe 948 spoolsv.exe 4700 spoolsv.exe 3012 spoolsv.exe 972 spoolsv.exe 1040 spoolsv.exe 4384 spoolsv.exe 2964 spoolsv.exe 3028 spoolsv.exe 1436 spoolsv.exe 1652 spoolsv.exe 4064 spoolsv.exe 3836 spoolsv.exe 4296 spoolsv.exe 4772 spoolsv.exe 4104 spoolsv.exe 4724 spoolsv.exe 3212 spoolsv.exe 2864 spoolsv.exe 2088 spoolsv.exe 5036 spoolsv.exe 4836 spoolsv.exe 2536 spoolsv.exe 2236 spoolsv.exe 4808 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 1572 set thread context of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 4684 set thread context of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 set thread context of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 972 set thread context of 1868 972 explorer.exe 107 PID 1868 set thread context of 3904 1868 explorer.exe 108 PID 4448 set thread context of 1676 4448 spoolsv.exe 113 PID 4124 set thread context of 5020 4124 spoolsv.exe 117 PID 4132 set thread context of 1916 4132 spoolsv.exe 121 PID 4000 set thread context of 2828 4000 spoolsv.exe 125 PID 2684 set thread context of 3140 2684 spoolsv.exe 129 PID 1604 set thread context of 4024 1604 spoolsv.exe 133 PID 4464 set thread context of 948 4464 spoolsv.exe 137 PID 4700 set thread context of 3012 4700 spoolsv.exe 141 PID 972 set thread context of 1040 972 spoolsv.exe 145 PID 4384 set thread context of 2964 4384 spoolsv.exe 149 PID 3028 set thread context of 1436 3028 spoolsv.exe 153 PID 1652 set thread context of 4064 1652 spoolsv.exe 157 PID 3836 set thread context of 4296 3836 spoolsv.exe 161 PID 4772 set thread context of 4104 4772 spoolsv.exe 165 PID 4724 set thread context of 3212 4724 spoolsv.exe 169 PID 2864 set thread context of 2088 2864 spoolsv.exe 173 PID 5036 set thread context of 4836 5036 spoolsv.exe 177 PID 2536 set thread context of 2236 2536 spoolsv.exe 181 -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 972 explorer.exe 972 explorer.exe 4448 spoolsv.exe 4448 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 3904 explorer.exe 3904 explorer.exe 4124 spoolsv.exe 4124 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4132 spoolsv.exe 4132 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4000 spoolsv.exe 4000 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 2684 spoolsv.exe 2684 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 1604 spoolsv.exe 1604 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4464 spoolsv.exe 4464 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4700 spoolsv.exe 4700 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 972 spoolsv.exe 972 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4384 spoolsv.exe 4384 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 3028 spoolsv.exe 3028 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 1652 spoolsv.exe 1652 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 3836 spoolsv.exe 3836 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4772 spoolsv.exe 4772 spoolsv.exe 3904 explorer.exe 3904 explorer.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 972 explorer.exe 972 explorer.exe 3904 explorer.exe 3904 explorer.exe 4448 spoolsv.exe 4448 spoolsv.exe 3904 explorer.exe 3904 explorer.exe 4124 spoolsv.exe 4124 spoolsv.exe 4132 spoolsv.exe 4132 spoolsv.exe 4000 spoolsv.exe 4000 spoolsv.exe 2684 spoolsv.exe 2684 spoolsv.exe 1604 spoolsv.exe 1604 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 4700 spoolsv.exe 4700 spoolsv.exe 972 spoolsv.exe 972 spoolsv.exe 4384 spoolsv.exe 4384 spoolsv.exe 3028 spoolsv.exe 3028 spoolsv.exe 1652 spoolsv.exe 1652 spoolsv.exe 3836 spoolsv.exe 3836 spoolsv.exe 4772 spoolsv.exe 4772 spoolsv.exe 4724 spoolsv.exe 4724 spoolsv.exe 2864 spoolsv.exe 2864 spoolsv.exe 5036 spoolsv.exe 5036 spoolsv.exe 2536 spoolsv.exe 2536 spoolsv.exe 4808 spoolsv.exe 4808 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3444 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 83 PID 1572 wrote to memory of 3444 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 83 PID 1572 wrote to memory of 3444 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 83 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 1572 wrote to memory of 4684 1572 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 85 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 516 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 102 PID 4684 wrote to memory of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 4684 wrote to memory of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 4684 wrote to memory of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 4684 wrote to memory of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 4684 wrote to memory of 1108 4684 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 103 PID 516 wrote to memory of 972 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 104 PID 516 wrote to memory of 972 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 104 PID 516 wrote to memory of 972 516 7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe 104 PID 972 wrote to memory of 5060 972 explorer.exe 105 PID 972 wrote to memory of 5060 972 explorer.exe 105 PID 972 wrote to memory of 5060 972 explorer.exe 105 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107 PID 972 wrote to memory of 1868 972 explorer.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe"C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exeC:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exeC:\Users\Admin\AppData\Local\Temp\7e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9ddN.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5060
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1868 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3904 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4688
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3744
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:100
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4680
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3216
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4320
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:760
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2376
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1108
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD545824c5f44b28f49d299db10996dce10
SHA190948e943179080047ebca8c2aa65f6b7e87de4b
SHA2567e05d0cf05bb1d5014f738bc5dc1b15dbfab371e0ba92fc508c40f17e57bc9dd
SHA512f506476619faccc065c20cbe842e60c4c7e259a3ab3d79ed5d26130c19b1bb47af558df300f858062a4c72c94b563a2e7cdfad40301e22b478e532992345d7fd
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD56c929d54e811b7ca245c2e9ca000878d
SHA1bcdeef63408144a5708b2c9f9467279e287aa421
SHA256b9c2c7f891eb38ef3da7aedd7981d0332bb7603466b28c7e44b110f79d1ebe50
SHA512d2cb8378b80f95a0c539f56930369184ae2105ce4ebfa43c8e9c2748e5590251c3f4dc6dd6090dbddf7779c7c4f4b23273038d821da73ace8d98406347b01d86
-
Filesize
2.9MB
MD58f1d85a500a2b1df0b9a017b9e622478
SHA1788e488dcb2de137adcddb11933abd68caf840e8
SHA2568f925d2e9087da86306804e770d2452d06cc12393c709c6849bac31554f0feb2
SHA51220d69f399f3e601fd9836f116ad99de24a44e04bbb9170a68d0ca663b019063c812e5fa627212f419da2ea0d513d1aa419f3ca4b10ee885e620e900b7197d928