Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 03:28
Behavioral task
behavioral1
Sample
06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe
Resource
win10v2004-20241007-en
General
-
Target
06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe
-
Size
2.9MB
-
MD5
dca78b4c00220aa701257ce8e80856a0
-
SHA1
7d8473c7b6e20225cda428ee7f3a94629e59e41e
-
SHA256
06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929
-
SHA512
64ae5cbb0e7ca37ea2b87a5a04ed9c7756eac04d56d8771896f755055c562ce534f2b83806712fff173ad82450b1a914fd74f52ea9cf67ac3a216e222239a0f6
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHV:ATU7AAmw4gxeOw46fUbNecCCFbNecm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023b9a-31.dat warzonerat behavioral2/files/0x000b000000023b98-58.dat warzonerat behavioral2/files/0x0004000000000711-74.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 20 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 42 IoCs
pid Process 396 explorer.exe 4604 explorer.exe 3140 explorer.exe 348 spoolsv.exe 5024 spoolsv.exe 4956 spoolsv.exe 5104 spoolsv.exe 2240 spoolsv.exe 4240 spoolsv.exe 1584 spoolsv.exe 4960 spoolsv.exe 2056 spoolsv.exe 712 spoolsv.exe 748 spoolsv.exe 4088 spoolsv.exe 2896 spoolsv.exe 3940 spoolsv.exe 924 spoolsv.exe 4936 spoolsv.exe 2084 spoolsv.exe 1384 spoolsv.exe 2520 spoolsv.exe 4460 spoolsv.exe 3764 spoolsv.exe 1348 spoolsv.exe 3324 spoolsv.exe 3052 spoolsv.exe 820 spoolsv.exe 4068 spoolsv.exe 208 spoolsv.exe 1572 spoolsv.exe 3004 spoolsv.exe 4996 spoolsv.exe 3496 spoolsv.exe 3620 spoolsv.exe 3396 spoolsv.exe 5088 spoolsv.exe 2448 spoolsv.exe 4424 spoolsv.exe 1972 spoolsv.exe 3728 spoolsv.exe 1196 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 4956 set thread context of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4868 set thread context of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 396 set thread context of 4604 396 explorer.exe 99 PID 4604 set thread context of 3140 4604 explorer.exe 100 PID 4604 set thread context of 2296 4604 explorer.exe 101 PID 4956 set thread context of 5104 4956 spoolsv.exe 109 PID 2240 set thread context of 4240 2240 spoolsv.exe 113 PID 1584 set thread context of 4960 1584 spoolsv.exe 117 PID 2056 set thread context of 712 2056 spoolsv.exe 121 PID 748 set thread context of 4088 748 spoolsv.exe 125 PID 2896 set thread context of 3940 2896 spoolsv.exe 129 PID 924 set thread context of 4936 924 spoolsv.exe 133 PID 2084 set thread context of 1384 2084 spoolsv.exe 137 PID 2520 set thread context of 4460 2520 spoolsv.exe 141 PID 3764 set thread context of 1348 3764 spoolsv.exe 145 PID 3324 set thread context of 3052 3324 spoolsv.exe 149 PID 820 set thread context of 4068 820 spoolsv.exe 153 PID 208 set thread context of 1572 208 spoolsv.exe 157 PID 3004 set thread context of 4996 3004 spoolsv.exe 161 PID 3496 set thread context of 3620 3496 spoolsv.exe 165 PID 3396 set thread context of 5088 3396 spoolsv.exe 169 PID 2448 set thread context of 4424 2448 spoolsv.exe 173 PID 1972 set thread context of 3728 1972 spoolsv.exe 177 -
resource yara_rule behavioral2/memory/4956-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4956-11-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x000d000000023b9a-31.dat upx behavioral2/memory/396-46-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x000b000000023b98-58.dat upx behavioral2/memory/348-75-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x0004000000000711-74.dat upx behavioral2/memory/348-86-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4956-104-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2240-106-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1584-131-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2056-143-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/748-156-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2896-170-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/924-172-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2084-185-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2520-198-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3764-222-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3324-225-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/820-240-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/208-266-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3004-280-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3496-282-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3396-297-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2448-312-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1972-327-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1196-340-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 396 explorer.exe 396 explorer.exe 3140 explorer.exe 3140 explorer.exe 3140 explorer.exe 3140 explorer.exe 4956 spoolsv.exe 4956 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 2240 spoolsv.exe 2240 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 1584 spoolsv.exe 1584 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 2056 spoolsv.exe 2056 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 748 spoolsv.exe 748 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 2896 spoolsv.exe 2896 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 924 spoolsv.exe 924 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 2084 spoolsv.exe 2084 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 2520 spoolsv.exe 2520 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 3764 spoolsv.exe 3764 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 3324 spoolsv.exe 3324 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 820 spoolsv.exe 820 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 208 spoolsv.exe 208 spoolsv.exe 3140 explorer.exe 3140 explorer.exe 3004 spoolsv.exe 3004 spoolsv.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 396 explorer.exe 396 explorer.exe 3140 explorer.exe 3140 explorer.exe 3140 explorer.exe 3140 explorer.exe 4956 spoolsv.exe 4956 spoolsv.exe 2240 spoolsv.exe 2240 spoolsv.exe 1584 spoolsv.exe 1584 spoolsv.exe 2056 spoolsv.exe 2056 spoolsv.exe 748 spoolsv.exe 748 spoolsv.exe 2896 spoolsv.exe 2896 spoolsv.exe 924 spoolsv.exe 924 spoolsv.exe 2084 spoolsv.exe 2084 spoolsv.exe 2520 spoolsv.exe 2520 spoolsv.exe 3764 spoolsv.exe 3764 spoolsv.exe 3324 spoolsv.exe 3324 spoolsv.exe 820 spoolsv.exe 820 spoolsv.exe 208 spoolsv.exe 208 spoolsv.exe 3004 spoolsv.exe 3004 spoolsv.exe 3496 spoolsv.exe 3496 spoolsv.exe 3396 spoolsv.exe 3396 spoolsv.exe 2448 spoolsv.exe 2448 spoolsv.exe 1972 spoolsv.exe 1972 spoolsv.exe 1196 spoolsv.exe 1196 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 2184 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 82 PID 4956 wrote to memory of 2184 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 82 PID 4956 wrote to memory of 2184 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 82 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4956 wrote to memory of 4868 4956 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 84 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 4060 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 94 PID 4868 wrote to memory of 1992 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 95 PID 4868 wrote to memory of 1992 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 95 PID 4868 wrote to memory of 1992 4868 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 95 PID 4060 wrote to memory of 396 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 96 PID 4060 wrote to memory of 396 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 96 PID 4060 wrote to memory of 396 4060 06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe 96 PID 396 wrote to memory of 3596 396 explorer.exe 97 PID 396 wrote to memory of 3596 396 explorer.exe 97 PID 396 wrote to memory of 3596 396 explorer.exe 97 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99 PID 396 wrote to memory of 4604 396 explorer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe"C:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exeC:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exeC:\Users\Admin\AppData\Local\Temp\06b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929N.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3596
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4604 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3140 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1176
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1460
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3404
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2552
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:3052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2944
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3796
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2904
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:748
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2960
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2296
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1992
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5dca78b4c00220aa701257ce8e80856a0
SHA17d8473c7b6e20225cda428ee7f3a94629e59e41e
SHA25606b3da331605db10200c0f8cea0b12840f11c171abccdabc41a63915499a7929
SHA51264ae5cbb0e7ca37ea2b87a5a04ed9c7756eac04d56d8771896f755055c562ce534f2b83806712fff173ad82450b1a914fd74f52ea9cf67ac3a216e222239a0f6
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD584526c63218e6bd43a155a81d2022f40
SHA1782aa6ed311441418b9cf1308b0c8b1851fe5bb2
SHA2568538be950d90d61fccb7c316368d936f39a074eca445b63c2c4f2b2d275ec102
SHA51201c80dab4b0e69f89c9305b5b85b2f4dae26b9746ed047e1788ccefe482c7364620ca25ada0df794c5758e2e81315dc8e43d785e98061ffa30cde6f116b665e7
-
Filesize
2.9MB
MD5c6ad5919edcb8c3dfd47294848a7f1e4
SHA1d0646d045d3f22d5f1ee434d8628fb9bfe806742
SHA256a6f0fe80b8d4975f3fb9460b0fe889d7fa9e71dba191a8c3fc229f46d002c22c
SHA512fd4dbff5309c37ce37ac9c8bddc33d99e07cb2b032fa5e512f652c1497dbc7eb3260c817e88cdea4f02955364c94f812e15243b48afe7b5a4cb97026acf1c920