Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 17:26
Behavioral task
behavioral1
Sample
921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe
Resource
win10v2004-20241007-en
General
-
Target
921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe
-
Size
2.9MB
-
MD5
c123a36aa87d769544cf12e9e9c62d20
-
SHA1
280bb35621c86ae756c0acb01996d4e9bb0784ac
-
SHA256
921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1
-
SHA512
b8bd2643b669c3d44805290ac4ce080066f6b76ccdb283870fba9af016790f885196e4d8855d169c2037f5785aa907be47b53d92b039e8cbcf6bd36f6f20c4a5
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHu:7v97AXmw4gxeOw46fUbNecCCFbNecz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015d9a-85.dat warzonerat behavioral1/files/0x0007000000015d87-165.dat warzonerat behavioral1/files/0x0009000000015d87-181.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 15 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 44 IoCs
pid Process 2888 explorer.exe 1004 explorer.exe 1192 explorer.exe 1892 spoolsv.exe 2312 spoolsv.exe 1508 spoolsv.exe 2752 spoolsv.exe 2688 spoolsv.exe 2628 spoolsv.exe 1888 spoolsv.exe 2876 spoolsv.exe 2880 spoolsv.exe 1576 spoolsv.exe 1952 spoolsv.exe 2704 spoolsv.exe 760 spoolsv.exe 1904 spoolsv.exe 2100 spoolsv.exe 2768 spoolsv.exe 2716 spoolsv.exe 2656 spoolsv.exe 2624 spoolsv.exe 2016 spoolsv.exe 1844 spoolsv.exe 2172 spoolsv.exe 2740 spoolsv.exe 2944 spoolsv.exe 1924 spoolsv.exe 852 spoolsv.exe 1000 spoolsv.exe 2168 spoolsv.exe 2592 spoolsv.exe 2824 spoolsv.exe 2520 spoolsv.exe 2528 spoolsv.exe 2864 spoolsv.exe 3068 spoolsv.exe 2984 spoolsv.exe 1612 spoolsv.exe 2268 spoolsv.exe 1032 spoolsv.exe 2840 spoolsv.exe 2316 spoolsv.exe 2584 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 1192 explorer.exe 1192 explorer.exe 1892 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1508 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2688 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1888 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2880 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1952 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 760 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2100 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2716 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2624 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1844 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2740 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1924 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1000 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2592 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2520 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2864 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2984 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2268 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 2840 spoolsv.exe 1192 explorer.exe 1192 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2764 set thread context of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2700 set thread context of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 set thread context of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2888 set thread context of 1004 2888 explorer.exe 39 PID 1004 set thread context of 1192 1004 explorer.exe 40 PID 1004 set thread context of 1664 1004 explorer.exe 41 PID 1892 set thread context of 2312 1892 spoolsv.exe 45 PID 1508 set thread context of 2752 1508 spoolsv.exe 49 PID 2688 set thread context of 2628 2688 spoolsv.exe 53 PID 1888 set thread context of 2876 1888 spoolsv.exe 56 PID 2880 set thread context of 1576 2880 spoolsv.exe 60 PID 1952 set thread context of 2704 1952 spoolsv.exe 64 PID 760 set thread context of 1904 760 spoolsv.exe 68 PID 2100 set thread context of 2768 2100 spoolsv.exe 72 PID 2716 set thread context of 2656 2716 spoolsv.exe 76 PID 2624 set thread context of 2016 2624 spoolsv.exe 80 PID 1844 set thread context of 2172 1844 spoolsv.exe 84 PID 2740 set thread context of 2944 2740 spoolsv.exe 88 PID 1924 set thread context of 852 1924 spoolsv.exe 92 PID 1000 set thread context of 2168 1000 spoolsv.exe 96 PID 2592 set thread context of 2824 2592 spoolsv.exe 100 PID 2520 set thread context of 2528 2520 spoolsv.exe 104 PID 2864 set thread context of 3068 2864 spoolsv.exe 108 PID 2984 set thread context of 1612 2984 spoolsv.exe 112 PID 2268 set thread context of 1032 2268 spoolsv.exe 116 PID 2840 set thread context of 2316 2840 spoolsv.exe 120 -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 2888 explorer.exe 1892 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1508 spoolsv.exe 1192 explorer.exe 2688 spoolsv.exe 1192 explorer.exe 1888 spoolsv.exe 1192 explorer.exe 2880 spoolsv.exe 1192 explorer.exe 1952 spoolsv.exe 1192 explorer.exe 760 spoolsv.exe 1192 explorer.exe 2100 spoolsv.exe 1192 explorer.exe 2716 spoolsv.exe 1192 explorer.exe 2624 spoolsv.exe 1192 explorer.exe 1844 spoolsv.exe 1192 explorer.exe 2740 spoolsv.exe 1192 explorer.exe 1924 spoolsv.exe 1192 explorer.exe 1000 spoolsv.exe 1192 explorer.exe 2592 spoolsv.exe 1192 explorer.exe 2520 spoolsv.exe 1192 explorer.exe 2864 spoolsv.exe 1192 explorer.exe 2984 spoolsv.exe 1192 explorer.exe 2268 spoolsv.exe 1192 explorer.exe 2840 spoolsv.exe 1192 explorer.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 2888 explorer.exe 2888 explorer.exe 1192 explorer.exe 1192 explorer.exe 1892 spoolsv.exe 1892 spoolsv.exe 1192 explorer.exe 1192 explorer.exe 1508 spoolsv.exe 1508 spoolsv.exe 2688 spoolsv.exe 2688 spoolsv.exe 1888 spoolsv.exe 1888 spoolsv.exe 2880 spoolsv.exe 2880 spoolsv.exe 1952 spoolsv.exe 1952 spoolsv.exe 760 spoolsv.exe 760 spoolsv.exe 2100 spoolsv.exe 2100 spoolsv.exe 2716 spoolsv.exe 2716 spoolsv.exe 2624 spoolsv.exe 2624 spoolsv.exe 1844 spoolsv.exe 1844 spoolsv.exe 2740 spoolsv.exe 2740 spoolsv.exe 1924 spoolsv.exe 1924 spoolsv.exe 1000 spoolsv.exe 1000 spoolsv.exe 2592 spoolsv.exe 2592 spoolsv.exe 2520 spoolsv.exe 2520 spoolsv.exe 2864 spoolsv.exe 2864 spoolsv.exe 2984 spoolsv.exe 2984 spoolsv.exe 2268 spoolsv.exe 2268 spoolsv.exe 2840 spoolsv.exe 2840 spoolsv.exe 2584 spoolsv.exe 2584 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2772 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 30 PID 2764 wrote to memory of 2772 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 30 PID 2764 wrote to memory of 2772 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 30 PID 2764 wrote to memory of 2772 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 30 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2764 wrote to memory of 2700 2764 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 32 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 1624 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 34 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 2700 wrote to memory of 2796 2700 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 35 PID 1624 wrote to memory of 2888 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 36 PID 1624 wrote to memory of 2888 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 36 PID 1624 wrote to memory of 2888 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 36 PID 1624 wrote to memory of 2888 1624 921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe 36 PID 2888 wrote to memory of 2916 2888 explorer.exe 37 PID 2888 wrote to memory of 2916 2888 explorer.exe 37 PID 2888 wrote to memory of 2916 2888 explorer.exe 37 PID 2888 wrote to memory of 2916 2888 explorer.exe 37 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39 PID 2888 wrote to memory of 1004 2888 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe"C:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exeC:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exeC:\Users\Admin\AppData\Local\Temp\921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1N.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2916
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1004 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1192 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:340
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2228
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1256
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3052
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2680
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:872
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1696
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1664
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5c123a36aa87d769544cf12e9e9c62d20
SHA1280bb35621c86ae756c0acb01996d4e9bb0784ac
SHA256921640f73c23da962e2142762759812e96f1b681c3ac80ae4b9949c5d9ed45c1
SHA512b8bd2643b669c3d44805290ac4ce080066f6b76ccdb283870fba9af016790f885196e4d8855d169c2037f5785aa907be47b53d92b039e8cbcf6bd36f6f20c4a5
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD53ccc312b16d649591ba24279e6fe1d39
SHA1793db5a28f2e3e0ab1756de8085b591839c89234
SHA256fef4da0639ae5f83493afa74e89e293ce18c37b750775245cd9cb98838ff99fd
SHA5125f40798817430fd9ca94cc9aee0ac4517b0d4738ef42abd9aa54e6c5c1b336227cd8a5b0a69d21ae542c6c4e21a6304498e996aa8ed039c796b265d60d63839b
-
Filesize
2.9MB
MD5aef1d802a539f6dff4aa8d431bedf6fe
SHA10af120e55180f6cbb677408847b8b6d3fb249edb
SHA2562299624819e1f7aed8ed6472c659663bc87e4eaacdf029d83623509f2ce5c4a6
SHA5129c8ef1909338251f6fe6196c346c1fcaf78c4fb4fa9ff163015ef28efe484b3fdb06666e820a83549e8b8ea42aef8d2dd887f4965f58160620094b937f752f42