Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 17:47
Behavioral task
behavioral1
Sample
0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe
Resource
win10v2004-20241007-en
General
-
Target
0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe
-
Size
2.9MB
-
MD5
95b6da48cf4b900800a95a5e8f0268a0
-
SHA1
1695fe1abe812d904ae0840b3496842fa0b56e3d
-
SHA256
0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670c
-
SHA512
f54cd6d03168873b06930f223f45b6faed9f51b7040925c30a3117eb82725a97b03a2641ca87c2a444b692a1c1cfa44556d0fe2d7c6f4a47eb8e078a60dcb3e0
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHb:7v97AXmw4gxeOw46fUbNecCCFbNecE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015d5c-93.dat warzonerat behavioral1/files/0x0008000000015d2e-164.dat warzonerat behavioral1/files/0x0008000000015d64-182.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 18 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 46 IoCs
pid Process 1804 explorer.exe 2296 explorer.exe 444 explorer.exe 1384 spoolsv.exe 740 spoolsv.exe 2452 spoolsv.exe 2112 spoolsv.exe 2392 spoolsv.exe 2780 spoolsv.exe 2432 spoolsv.exe 2612 spoolsv.exe 1712 spoolsv.exe 1284 spoolsv.exe 2940 spoolsv.exe 2084 spoolsv.exe 1932 spoolsv.exe 1540 spoolsv.exe 3056 spoolsv.exe 1048 spoolsv.exe 2124 spoolsv.exe 2212 spoolsv.exe 2644 spoolsv.exe 2568 spoolsv.exe 1576 spoolsv.exe 2308 spoolsv.exe 1588 spoolsv.exe 1584 spoolsv.exe 2156 spoolsv.exe 2552 spoolsv.exe 1504 spoolsv.exe 2220 spoolsv.exe 2364 spoolsv.exe 2368 spoolsv.exe 2648 spoolsv.exe 1952 spoolsv.exe 1760 spoolsv.exe 856 spoolsv.exe 1580 spoolsv.exe 1960 spoolsv.exe 1944 spoolsv.exe 1996 spoolsv.exe 912 spoolsv.exe 1472 spoolsv.exe 2932 spoolsv.exe 2404 spoolsv.exe 2080 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 444 explorer.exe 444 explorer.exe 1384 spoolsv.exe 444 explorer.exe 444 explorer.exe 2452 spoolsv.exe 444 explorer.exe 444 explorer.exe 2392 spoolsv.exe 444 explorer.exe 444 explorer.exe 2432 spoolsv.exe 444 explorer.exe 444 explorer.exe 1712 spoolsv.exe 444 explorer.exe 444 explorer.exe 2940 spoolsv.exe 444 explorer.exe 444 explorer.exe 1932 spoolsv.exe 444 explorer.exe 444 explorer.exe 3056 spoolsv.exe 444 explorer.exe 444 explorer.exe 2124 spoolsv.exe 444 explorer.exe 444 explorer.exe 2644 spoolsv.exe 444 explorer.exe 444 explorer.exe 1576 spoolsv.exe 444 explorer.exe 444 explorer.exe 1588 spoolsv.exe 444 explorer.exe 444 explorer.exe 2156 spoolsv.exe 444 explorer.exe 444 explorer.exe 1504 spoolsv.exe 444 explorer.exe 444 explorer.exe 2364 spoolsv.exe 444 explorer.exe 444 explorer.exe 2648 spoolsv.exe 444 explorer.exe 444 explorer.exe 1760 spoolsv.exe 444 explorer.exe 444 explorer.exe 1580 spoolsv.exe 444 explorer.exe 444 explorer.exe 1944 spoolsv.exe 444 explorer.exe 444 explorer.exe 912 spoolsv.exe 444 explorer.exe 444 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 2384 set thread context of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 1700 set thread context of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 set thread context of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1804 set thread context of 2296 1804 explorer.exe 38 PID 2296 set thread context of 444 2296 explorer.exe 39 PID 2296 set thread context of 948 2296 explorer.exe 40 PID 1384 set thread context of 740 1384 spoolsv.exe 44 PID 2452 set thread context of 2112 2452 spoolsv.exe 48 PID 2392 set thread context of 2780 2392 spoolsv.exe 52 PID 2432 set thread context of 2612 2432 spoolsv.exe 55 PID 1712 set thread context of 1284 1712 spoolsv.exe 59 PID 2940 set thread context of 2084 2940 spoolsv.exe 63 PID 1932 set thread context of 1540 1932 spoolsv.exe 67 PID 3056 set thread context of 1048 3056 spoolsv.exe 71 PID 2124 set thread context of 2212 2124 spoolsv.exe 75 PID 2644 set thread context of 2568 2644 spoolsv.exe 79 PID 1576 set thread context of 2308 1576 spoolsv.exe 83 PID 1588 set thread context of 1584 1588 spoolsv.exe 87 PID 2156 set thread context of 2552 2156 spoolsv.exe 91 PID 1504 set thread context of 2220 1504 spoolsv.exe 95 PID 2364 set thread context of 2368 2364 spoolsv.exe 99 PID 2648 set thread context of 1952 2648 spoolsv.exe 103 PID 1760 set thread context of 856 1760 spoolsv.exe 107 PID 1580 set thread context of 1960 1580 spoolsv.exe 111 PID 1944 set thread context of 1996 1944 spoolsv.exe 115 PID 912 set thread context of 1472 912 spoolsv.exe 119 PID 2932 set thread context of 2404 2932 spoolsv.exe 123 -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 1804 explorer.exe 1384 spoolsv.exe 444 explorer.exe 444 explorer.exe 2452 spoolsv.exe 444 explorer.exe 2392 spoolsv.exe 444 explorer.exe 2432 spoolsv.exe 444 explorer.exe 1712 spoolsv.exe 444 explorer.exe 2940 spoolsv.exe 444 explorer.exe 1932 spoolsv.exe 444 explorer.exe 3056 spoolsv.exe 444 explorer.exe 2124 spoolsv.exe 444 explorer.exe 2644 spoolsv.exe 444 explorer.exe 1576 spoolsv.exe 444 explorer.exe 1588 spoolsv.exe 444 explorer.exe 2156 spoolsv.exe 444 explorer.exe 1504 spoolsv.exe 444 explorer.exe 2364 spoolsv.exe 444 explorer.exe 2648 spoolsv.exe 444 explorer.exe 1760 spoolsv.exe 444 explorer.exe 1580 spoolsv.exe 444 explorer.exe 1944 spoolsv.exe 444 explorer.exe 912 spoolsv.exe 444 explorer.exe 2932 spoolsv.exe 444 explorer.exe 2080 spoolsv.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 1804 explorer.exe 1804 explorer.exe 444 explorer.exe 444 explorer.exe 1384 spoolsv.exe 1384 spoolsv.exe 444 explorer.exe 444 explorer.exe 2452 spoolsv.exe 2452 spoolsv.exe 2392 spoolsv.exe 2392 spoolsv.exe 2432 spoolsv.exe 2432 spoolsv.exe 1712 spoolsv.exe 1712 spoolsv.exe 2940 spoolsv.exe 2940 spoolsv.exe 1932 spoolsv.exe 1932 spoolsv.exe 3056 spoolsv.exe 3056 spoolsv.exe 2124 spoolsv.exe 2124 spoolsv.exe 2644 spoolsv.exe 2644 spoolsv.exe 1576 spoolsv.exe 1576 spoolsv.exe 1588 spoolsv.exe 1588 spoolsv.exe 2156 spoolsv.exe 2156 spoolsv.exe 1504 spoolsv.exe 1504 spoolsv.exe 2364 spoolsv.exe 2364 spoolsv.exe 2648 spoolsv.exe 2648 spoolsv.exe 1760 spoolsv.exe 1760 spoolsv.exe 1580 spoolsv.exe 1580 spoolsv.exe 1944 spoolsv.exe 1944 spoolsv.exe 912 spoolsv.exe 912 spoolsv.exe 2932 spoolsv.exe 2932 spoolsv.exe 2080 spoolsv.exe 2080 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2212 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 28 PID 2384 wrote to memory of 2212 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 28 PID 2384 wrote to memory of 2212 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 28 PID 2384 wrote to memory of 2212 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 28 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 2384 wrote to memory of 1700 2384 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 30 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2492 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 33 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 1700 wrote to memory of 2980 1700 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 34 PID 2492 wrote to memory of 1804 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 35 PID 2492 wrote to memory of 1804 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 35 PID 2492 wrote to memory of 1804 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 35 PID 2492 wrote to memory of 1804 2492 0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe 35 PID 1804 wrote to memory of 2300 1804 explorer.exe 36 PID 1804 wrote to memory of 2300 1804 explorer.exe 36 PID 1804 wrote to memory of 2300 1804 explorer.exe 36 PID 1804 wrote to memory of 2300 1804 explorer.exe 36 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38 PID 1804 wrote to memory of 2296 1804 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe"C:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exeC:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exeC:\Users\Admin\AppData\Local\Temp\0f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670cN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2300
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2296 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:444 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1696
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1296
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2200
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1720
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2684
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2464
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1708
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1132
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3000
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2996
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2532
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1740
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1804
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:572
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1248
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2692
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2972
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:948
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD595b6da48cf4b900800a95a5e8f0268a0
SHA11695fe1abe812d904ae0840b3496842fa0b56e3d
SHA2560f9fbdd5f433012ce4d02a59d4fe339d8ec451a2d0f565e221cb37fc768e670c
SHA512f54cd6d03168873b06930f223f45b6faed9f51b7040925c30a3117eb82725a97b03a2641ca87c2a444b692a1c1cfa44556d0fe2d7c6f4a47eb8e078a60dcb3e0
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD597bce4aad8e03b76f676084c9394a867
SHA188e454149c3e8132474c573164f7f0eed7c4eafa
SHA256faf57464019761986bcec64fa8fdff084f8d00ece1e2147310f9fd637b72bbf9
SHA512b6f3b1ca23da5a29f4b9c963447ce6d0314fc5560bd92931a69197171a6e8b0275336428ebff85bdee91453bcae3737f4286a483cf5aa9bd5ea7e51c16b1db0c
-
Filesize
2.9MB
MD5f88bca8f461dc8a92b331e2eac5ca69e
SHA12ca13f846b8d2d90ce975a8fba7940ff86476c12
SHA256d8eb86a238d4131a4c3c4bb70cb9b5e2683607295416888a6ad25ababd280e53
SHA51222f0b88e517ff302b88b82017568ee4430861578cba9933e4a07c8e7bbf7fec9cc366a94c858b8569da1b3240032ad97663d4c4de85b4c0138e30df844db92ef